Static task
static1
Behavioral task
behavioral1
Sample
c2b67cd161391acd8b9330f7ac54ba4cb0d0830ecbd2487713254d3dcdc0db9c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c2b67cd161391acd8b9330f7ac54ba4cb0d0830ecbd2487713254d3dcdc0db9c.exe
Resource
win10v2004-20220812-en
General
-
Target
c2b67cd161391acd8b9330f7ac54ba4cb0d0830ecbd2487713254d3dcdc0db9c
-
Size
13KB
-
MD5
191244f5565f1b8dca157752cc2ad693
-
SHA1
c7c319018b9036cab566b7ba4c25f8f14235ec4c
-
SHA256
c2b67cd161391acd8b9330f7ac54ba4cb0d0830ecbd2487713254d3dcdc0db9c
-
SHA512
ff101c3201af6fe738884751a24617c2c5feafcb4c26e66632e5e6b516e0a95af5a80b9b2de88aace82f3a242319676c4b507dafb388a12add8d4698b19b1ee2
-
SSDEEP
192:dGaCHBejNrBwWFNqSBMPQ7UJ/iX/Bdtt3W73W2wB90kEtNqmw:dGaRwNQ3/BUq2wB9cfw
Malware Config
Signatures
Files
-
c2b67cd161391acd8b9330f7ac54ba4cb0d0830ecbd2487713254d3dcdc0db9c.exe windows x86
4f8f13591c318300e5c6e48b769e48be
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
strlen
strcpy
strncpy
memmove
kernel32
GetModuleHandleA
HeapCreate
GetCurrentThreadId
Sleep
SetFileAttributesA
HeapDestroy
ExitProcess
CreateProcessA
CloseHandle
GetCurrentProcess
GetModuleFileNameA
GetSystemDirectoryA
GetWindowsDirectoryA
CreateFileA
GetFileTime
SetFileTime
HeapAlloc
HeapFree
GetCurrentProcessId
InitializeCriticalSection
GetCommandLineA
CopyFileA
EnterCriticalSection
LeaveCriticalSection
TlsGetValue
TlsSetValue
TlsAlloc
HeapReAlloc
LoadLibraryA
GetProcAddress
WaitForMultipleObjects
GetCurrentThread
DuplicateHandle
CreateSemaphoreA
CreateThread
ReleaseSemaphore
comctl32
InitCommonControls
user32
GetInputState
PostThreadMessageA
GetMessageA
EnableWindow
DefWindowProcA
DestroyWindow
GetWindowLongA
GetWindowTextLengthA
GetWindowTextA
UnregisterClassA
LoadCursorA
RegisterClassExA
IsWindowEnabled
GetSystemMetrics
CreateWindowExA
SetWindowLongA
SendMessageA
SetFocus
CreateAcceleratorTableA
SetForegroundWindow
BringWindowToTop
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
DestroyAcceleratorTable
GetWindowThreadProcessId
IsWindowVisible
GetForegroundWindow
EnumWindows
gdi32
GetStockObject
advapi32
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
ole32
CoInitialize
Sections
.code Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 47B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 660B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ